首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 843 毫秒
1.
This paper examines the growing recognition of the phenomenon called “Big Data” and the policy implications it poses. It is argued that a core policy issue is personal and organizational privacy. At the same time there is a belief that analysis of “Big Data” offers potentially to provide public sector policy makers with extensive new information that would inform policy at unprecedentedly detailed levels. Despite this potential to improve the policy‐making process data often contain individual identifiable information that would negatively impact American core values such as privacy. This makes the use of these data almost impossible. The paper recognizes that there may be a way to strip individual data from Big Data sets thereby making their analysis more policy useful. This approach is not at this time technically feasible but research is ongoing.  相似文献   

2.
This article examines the intersection of Big Data and strategic intelligence from a theoretical-conceptual viewpoint. Adopting Popperian refutation as a starting point, it approaches methodological issues surrounding the incorporation of Big Data into the intelligence cycle, and argues that Big Data analytics is best used to discern long-term developments, generate intelligence hypotheses, and adduce refuting facts. The article then briefly examines the use of Big Data via social media, an increasingly fertile platform for intelligence analysis. Finally, the article argues that despite its potential in filling our epistemic gaps, Big Data should continue to complement traditional subject-matter expertise, supported by game theory, as part of a tripartite analytical framework for strategic intelligence consisting of ‘subtext’, ‘context’ and ‘metatext’. In this respect, Big Data may well become the midwife for more open modes of intelligence management and, ultimately, a more open society.  相似文献   

3.
In recent years, government leaks have brought many alleged potential privacy violating intelligence collection programs to the public arena. Intelligence collection can affect the privacy rights of citizens from any country. While the concept of privacy is a complicated one, United States citizen privacy is protected by various policies and laws. This paper reviews these alleged intelligence collection programs, as well as specific laws set in place to protect privacy. Also presented are discussions on public opinion and whether or not digital intelligence collection are providing a safer environment for Americans.  相似文献   

4.
Big data is increasingly the cornerstone on which policy making is based. However, with potential benefits and applications come challenges and dilemmas. In this set of symposium articles, authors examine the promise and problems of big data, exploring associated prospects, risks, parameters, and payoffs from a variety of perspectives. The articles address myriad challenges in the handling of big data sets, such as collection, validation, integrity, and security; ontological issues attending data analytics and conceptual transformations; the foundations of big data collection for social science research; the gap between the acquisition of data and its use to advance discovery and innovation; the costs and benefits of using big data in decision making and analysis; and, finally, related problems of privacy, security, and ethics. Issues such as these will continue to arise with increased use of big data as fundamental to policy making and governance in today's growing information society.  相似文献   

5.
ABSTRACT

Despite an increase in initiatives aimed at enhancing political transparency, democratic states claim the right to withhold information from citizens: classified intelligence and military programs, diplomatic discretion, closed-door political bargaining, and bureaucratic opacity are examples. Can the state’s claim to restrict access to information be justified? In the first part of the essay, I focus on the arguments that defend the state’s claim to restrict access in terms of the state’s right to privacy where the state privacy is presented as a species of group privacy. While I concede that group privacy may be defended, I argue that governments and parliaments are not the kind of groups that may exercise privacy against citizens because of the relation of accountability in which they stand to citizens. In the second part of the essay, I propose an alternative argument to the effect that the scope of openness required in democratic governance is less extensive than traditionally assumed. I focus on the concept of democratic authority and argue that we can understand the practices of classification as an exercise of a special right to secrecy that is implied in the democratic state’s right to rule in a content-independent way.  相似文献   

6.
Big data holds tremendous potential for public policy analysis. At the same time, its use prompts a number of issues related to statistical bias, privacy, equity, and governance, among others. Accordingly, there is a need to formulate, evaluate, and implement policies that not only mitigate the risks, but also maximize the benefits of using big data for policy analysis. This poses a number of challenges, which are highlighted in this essay.  相似文献   

7.
The introduction of Big Data sets in the healthcare domain has presented opportunities to engage in analytics of very large sets containing both structured and unstructured data. With advances in information technology (IT), these data sets have become available from diverse sources at greatly increased rates. The availability of Big Data sets has introduced complexities that we must address, not only in terms of semantics and analytics but also in terms of data management, storage, and distribution. Currently, the capabilities to ingest, analyze, and manage multipetabyte data sets have underscored the limitations of our analytics capabilities supported by relational database management systems. This essay argues that an ontology‐based approach to data analytics provides a practical framework to address the semantic challenges presented by Big Data sets. No ontological framework can address the operational and management requirements introduced by the availability of Big Data sets, however. There are also a number of IT architectural factors that must be considered in implementing such a framework.  相似文献   

8.
As part of the infrastructure for monitoring the movements of Private Security Companies (PSCs) in Iraq, a unique intelligence interface has been constructed to enhance cooperation between the military and PSCs. Using a wide range of existing intelligence-sharing agreements and guidelines for handling classified information, PSC contractors working with the US military have been able to provide unclassified intelligence products to the wider PSC community. Using lessons learned in Iraq as a contractor building this interface, the author explains how institutional difficulties were overcome and argues that the US military should be better prepared to share intelligence with the wide range of organizations it can expect to work with in future unconventional warfare or nation-building operations. Some of the lessons learned in Iraq can also be applied to the US Department of Homeland Security's Regional Fusion Centers, where many of the same difficulties with intelligence-sharing and integration with commercial organizations are being encountered.  相似文献   

9.
Canada's Communications Security Establishment has undergone a far-reaching transformation in conjunction with the expanded role of Signals Intelligence in the global ‘war on terror’. For the first time, Canada adopted a formal statute for CSE, including an expanded remit for countering terrorism. With a shift in targeting priorities towards terrorism and threats to Canadian interests abroad, Canada's participation in SIGINT-related international partnerships takes on new significance. The collection of communication intelligence touches upon public sensibilities regarding privacy rights of Canadians. The evolution of Canadian SIGINT capabilities was therefore accompanied by the establishment, as early as 1996, of a system for intelligence accountability and review, the Office of the CSE Commissioner. Recent advances in communications technology and pressing requirements for Signals Intelligence have impelled changes in the law, while also accentuating the role played by the CSE Commissioner in scrutinizing CSE activities to ensure compliance with ministerial authorizations and the laws of Canada.  相似文献   

10.
The Edward Snowden leaks challenge policy makers and the public's understanding and perspectives on the role of security intelligence in liberal democratic states. This article explores the challenges confronting security intelligence collection by the ‘Five Eyes’ countries – particularly those most affected by the leaks. We argue that the debate now needs to move beyond simplistic notions of privacy vs. security to a more detailed understanding of the policy and ethical dilemmas confronting policy makers and intelligence agencies. To that end, we provide a schematic framework (methods, context and target) to promote a better understanding of the practical, policy and ethical problems for security intelligence collection emerging post Snowden. The framework is a first step in identifying common principles that could be used develop an ethically informed set of policy guidelines to help decision makers better navigate between citizen's two basic rights: security and privacy.  相似文献   

11.
Data protection has emerged as a major corporate and government concern worldwide. The focus is on secure handling of data so as to ensure privacy of customer data and security of corporate data. Privacy and security laws in countries are not harmonized; compliance regulations are different too. As the global hub of outsourcing, India is faced with a challenge of demonstrating compliance with varying compliance regulations in countries. The Data Security Council of India (DSCI) considers the Best Practices Approach as a practical and realistic way to enhance adherence to data security and privacy standards, and to enable a service provider to demonstrate compliance. Getting these standards recognized through contracts can promote data protection. An industry association can act as a third party self‐regulatory organization to promote these standards and enforce them among its members through certification or privacy seals, thereby helping implement data protection in international data flows.  相似文献   

12.
Intelligence agencies routinely use surveillance technology to perform surveillance on digital data. This practice raises many questions that feed a societal debate, including whether the surveillance technology is effective in achieving the given security goal, whether it is cost-efficient, and whether it is proportionate. Oversight bodies are important actors in this debate, overseeing budgets, legal and privacy matters, and the performance of intelligence agencies. This paper examines how oversight bodies evaluate the questions above, using documents produced by American and British oversight mechanisms.  相似文献   

13.
In the debate on intelligence contracting, intelligence officers are grouped into two personnel categories characterized by opposing sets of motivations and interests. Government employees are assumed to be motivated by a higher goal related to national security, while intelligence contractors are said to be motivated primarily by pecuniary interests and loyal first and foremost to their shareholders. Contemporary research on human motivation, however, suggests that the two personnel categories are not all that different in that both appear to be intrinsically motivated and loyal primarily to the mission at hand, namely national security. Moreover, comparative research on public organizations and private corporations suggests that there are more similarities between the two than there are differences. This must lead us to re-examine the recent criticism fielded against the practice of intelligence contracting.  相似文献   

14.
Answering “Big Questions” in public management will require close connections to social science, in particular political science. Yet connections are impeded by the difference in standpoint from which these questions are regarded by public management researchers and political scientists. Changing to a citizen standpoint changes the Big Questions and pushes political science and PM research toward unification. It also makes research more useful—at least to citizens.  相似文献   

15.
Contrary to intelligence services in other democracies worldwide, the activity of the Israeli Directorate of Military Intelligence, AMAN, is not merely centered around collection and research regarding military intelligence matters. Instead, AMAN covers the majority of intelligence activity arenas, including intelligence regarding state-related issues. This field of activity presents a situation where AMAN's officers, and predominantly, its research division, are compelled to deal with sensitive issues embedded well within Israeli political and public controversy. This is commonly illustrated in the field of ‘Intelligence for Peace’ in general and more specifically in the Palestinian arena. Intelligence research surrounding the question of Palestinian commitment to peace throughout the Oslo Process and following the onset of the al Aqsa Intifada – activity classified as ‘Intelligence on Intentions’ – placed AMAM at the heart of political debate in Israel and resulted in bitter internal disagreements in AMAN as well as tensions between the intelligence service and the political leadership. Throughout the years, numerous recommendations have been repeatedly voiced to end AMAN's monopoly over Israel's national intelligence assessment (including aspects of intelligence regarding state-related issues). These recommendations were based predominantly on hindsight evaluations, such as AMAN's repeated failures in intelligence assessments. This paper calls for gradual termination of AMAN's activity of intelligence regarding state-related issues, in light of its contradiction with the appropriate military–political separation in a democratic society. Moreover, it places AMAN at the heart of the political debate dividing Israeli society.  相似文献   

16.
In this interview Harry Howe Ransom, a leading American scholar of intelligence studies over the past 50 years, discusses how he entered the field and his views regarding some key intelligence topics. Foremost on his research agenda has been the study of whether in democratic societies secret agencies can operate side-by-side with an otherwise open government without violating basic civil liberties – the difficult balancing act between the need for security, on the one hand, and the cherished value of liberty, on the other. He has also been a leading critic of intelligence politicization, noting in this interview that there is a tendency for intelligence systems to provide information they think their top bosses want to hear, and for the top bosses – more often than not – to do what they wish in spite of intelligence to the contrary. Professor Ransom began his research into intelligence as a young political scientist at Harvard University and continued this work throughout his subsequent distinguished career at Vanderbilt University and into his retirement years.  相似文献   

17.
Abstract

Transnational information sharing among security agencies in the European Union and beyond has grown considerably more important over the past decades. Centralised databases and numerous formal and informal networks now facilitate cooperation and information sharing. However, sharing intelligence may not only conflict with the protection of fundamental rights (data protection/privacy; presumption of innocence), but also with the organisational culture of institutions that are built upon secrecy. Police agencies often keep knowledge about individual cases and their strategies secret as long as possible. Intelligence services build their work and strategies upon secrecy even more. This paper analyses the variations of secrecy that can be observed for police agencies and secret services, and the relationship between information sharing among security agencies, secrecy, trust, transparency and accountability. In a normative perspective, the paper explores answers to the questions of how secret the work of security agencies should be in democratic rule of law systems and how accountability can be improved without making these institutions work less effectively.  相似文献   

18.
Academic research can improve national security, yet the process by which findings flow from the ivory tower to intelligence agencies is not well understood by scholars. This article addresses this gap through an exploratory case study of when research impacted intelligence: the incorporation of cognitive biases research in intelligence analysis. The results of this study illustrate the importance of idea entrepreneurs—individuals who promote academic research—as well as the need for making academic findings applicable to intelligence practitioners. These results, while based on a single case, suggest new avenues for scholarship exploring knowledge utilization in intelligence.  相似文献   

19.
Scientific intelligence was coined during World War II, yet despite its age and relative importance it has not received the attention it should have. This is surprising given the recent and growing interest in WMD programmes. This article sets out the main components of scientific intelligence, seeking to explore how scientific intelligence has been defined, how it operates, and contemplates the key issues involved. In doing so it aims to set an agenda for future research into this crucial area.  相似文献   

20.
Over the last several decades, civil society activists and non-governmental organizations have been employing new information and communication technologies, such as the Internet, to facilitate their activities. At the same time, an increasing number of computer scientists, hackers, and engineers have become increasingly politicized, contributing their skills to security, privacy, and networking tools used by civil society organizations worldwide. The merging of these two social forces, and their sophisticated uses of technology for political action, is giving rise to a new form of distributed information and communication networking that I refer to as ‘network intelligence’.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号